-
Notifications
You must be signed in to change notification settings - Fork 14.6k
Centreon authenticated command injection leading to RCE via broker engine "reload" parameter [CVE-2025-5946] #20672
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
|
||
| # login at the Centreon web application | ||
| # return true if login successful else false | ||
| def centreon_login(name, pwd) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It'd be lovely this have this into a mixing, as there are already 3 modules targeting centreon.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'd agree here, i think we have a non-written rule that if 3 modules are doing something similar it should be a mixin.
|
|
||
| # get the Centreon version | ||
| # return version if successful else nil | ||
| def get_centreon_version |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This would also be great to have in a mixin <3
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hello @h00die-gr3y,
Thanks for your module, I've left a review and I will setup the target to test the exploit.
|
|
||
| # login at the Centreon web application | ||
| # return true if login successful else false | ||
| def centreon_login(name, pwd) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'd agree here, i think we have a non-written rule that if 3 modules are doing something similar it should be a mixin.
My version in theory is not exploitable but this looks like a nice shell 🐚 |
Centreon is a platform designed to monitor your cloud and on-premises infrastructure.
This module exploits an command injection vulnerability using the
broker engine reloadsetting on the poller configuration page of the Centreon web application. Injecting a malcious payload at thebroker engine reloadparameter and restarting the poller triggers this vulnerability.You need have admin access at the Centreon Web application in order to execute this RCE.
This issue affects all Centreon editions >=
19.10.0and it is fixed in Centreon Web versions24.10.13,24.04.18and23.10.28.